A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition
暂无分享,去创建一个
[1] Darrell D. E. Long,et al. The management of replication in a distributed system , 1988 .
[2] Jai Menon,et al. orithms for Software ai d Low-cost ardware RAIDS , 1995 .
[3] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[4] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Hugo Krawczyk. Distributed fingerprints and secure information dispersal , 1993, PODC '93.
[6] Alfredo De Santis,et al. Multiple ramp schemes , 1999, IEEE Trans. Inf. Theory.
[7] David J. DeWitt,et al. A performance study of three high availability data replication strategies , 2005, Distributed and Parallel Databases.
[8] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[9] J. Menon,et al. Algorithms for software and low-cost hardware RAIDs , 1995, Digest of Papers. COMPCON'95. Technologies for the Information Superhighway.
[10] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[11] Randy H. Katz,et al. A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.
[12] W. Greub. Linear Algebra , 1981 .
[13] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[14] Hugo Krawczyk,et al. Adaptive Security for Threshold Cryptosystems , 1999, CRYPTO.
[15] Gregory R. Ganger,et al. On Correlated Failures in Survivable Storage Systems , 2002 .
[16] Darrell D. E. Long. A technique for managing mirrored disks , 2001, Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210).
[17] David Joyner,et al. Linear Algebra with Applications , 1998 .